Preferred Language
Articles
/
jBbli4cBVTCNdQwCjlXF
Brief review of soft sets and its application in coding theory
...Show More Authors

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Rock facies classification and its effect on the estimation of original oil in place based on petrophysical properties data
...Show More Authors

The most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 26 2022
Journal Name
International Journal Of Corrosion And Scale Inhibition
Synthesis of polysulfanilamide by electro polymerization and its corrosion protective properties on 316L stainless steel in 0.2 M HCl
...Show More Authors

The electrochemical polymerization of the monomer sulfanilamide (SAM) in an aqueous solution at room temperature produces polysulfanilamide (PSAM). The Fourier Transform Infrared spectroscopy (FTIR) was used to investigate the properties of the prepared polymer layer that generated on the stainless steel (St.S) surface (working electrode) and Atomic Force Microscope (AFM) was used to characterize the morphology, topology, and detailed surface structure of polymer layer that generated on the surface. The corrosion behavior of uncoated and coated St.S were evaluated by using the electrochemical polarization method in a 0.2 M HCl solution and a temperature range of 293–323 K, the anticorrosion action of the polymer coating on stainless steel

... Show More
View Publication
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Automation in architecture and its effect on the regeneration of traditional buildings: Al-Shawi House as a case study
...Show More Authors
Abstract<p>The increased applications of technology in the field of architecture, especially digital technology and aspects of automation, have made a major impact on various aspects of local architecture, especially the traditional ones. As these technologies have succeeded in integrating many technological applications in many traditional and heritage buildings and taking them to more complex uses. And included in it characteristics that were not contained, therefore the research problem was concentrated in the absence of a holistic view of the role of the aspects of automation as a technological and design effect and its mutual effects on traditional buildings (especially the traditional Bagh</p> ... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Information and communication technology and its impact on the quality of service of the tourism sector and hotel: An analytical study in selected hotels in the Iraqi capital Baghdad
...Show More Authors

   The research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 08 2023
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
How to Estimate the Major Petrophysical Properties: A Review
...Show More Authors

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication